January 2017 Netsparker Cloud Update

Category: Releases - Last Updated: Thu, 26 Jan 2017 - by Robert Abela

During the end of 2016 and start of 2017 festive season, our developers were planning and developing the next Netsparker Cloud update. For a change they came up with something innovative, something that no other vendor has done yet; form authentication and session verification in an online web application security scanner.

And that’s not all! Read this post for an overview of what is new and improved in the first Netsparker Cloud update for 2017!

Authentication & Session Verification for Form Based Authentication

Prior to this release it was not possible to verify the credentials you have configured in Netsparker Cloud when scanning a password protected website. This meant that you can only find out if the configuration is correct once the scan is finished. This means that if the credentials were not correct, the scan would have been a waste of time and resources.

To solve this issue our developers built a new login verification system, so now you can verify the configured credentials before launching a scan. Also, should you wish you can also modify the logout detection pattern when configuring form authentication.

Read the article Configure Authentication and Verify the Credentials in Netsparker Cloud for more detailed information on how the new form authentication verification system works.

Verification of Credentials for Basic and NTLM/Kerberos Authentication

We also added authentication verification to Basic and NTLM/Kerberos authentication. Therefore when scanning a website with such authentication mechanism, do not forget to click the button Test Credentials prior to launching a web vulnerability scan.

Configuring and testing Basic, NTLM/Kerberos authentication in Netsparker Cloud

Support for Netsparker Hawk

Netsparker Hawk is a vulnerability testing infrastructure we announced earlier on this year. It is used by Netsparker Cloud and Netsparker Desktop to automatically detect vulnerabilities that cannot be detected using the typical request-response method. With the aid of Netsparker Hawk the scanner can now identify the following vulnerabilities:

  • Out-of-band Code Evaluation
  • Out-of-band Command Injection
  • Out-of-band Remote File Inclusion (RFI)
  • Out-of-band SQL Injection
  • Blind Cross-site Scripting (XSS)
  • XML External Entity (XXE) Injection
  • Server-Side Request Forgery (SSRF)

Read How the Netsparker web vulnerability scanner finds SSRF and out-of-band vulnerabilities for more detailed information on the Netsparker Hawk vulnerability testing infrastructure.

Other Netsparker Cloud Updates for January 2017

Apart from the above highlights we also added automatic confirmation of the Frame Injection vulnerabilities, improved the performance of the DOM simulations, updated the off-the-shelf web applications vulnerability database, improved the coverage of open redirects and much more. Please refer to the Netsparker Cloud changelog for a complete list of what is new, improved and fixed in this update.


Dead accurate, fast & easy-to-use Web Application Security Scanner